Computer Networking Fundamentals Final Assessment Flashcards
(20 cards)
How do IP addresses and subnet masks work?
An IP address is used to identify a device on a network, while a subnet mask is used to determine the network portion of the address.
What is the structure of IPv6 addresses?
IPv6 addresses consist of eight groups of four hexadecimal digits separated by colons.
What is the structure and format of MAC addresses?
MAC addresses are 48-bit numbers typically represented by 12 hexadecimal characters.
MAC addresses are 48-bit numbers typically represented by 12 hexadecimal characters.
What is the difference between physical and logical addresses in networking?
Physical addresses are unique identifiers assigned to devices at the data link layer of the OSI model, while logical addresses are unique identifiers assigned to devices at the network layer of the OSI model.
What is the primary function of a router in network topology?
Filtering and forwarding network traffic.
The primary function of a router in a network is to filter and forward network traffic between different networks.
What are logical ports?
Numeric identifiers used by network protocols to uniquely identify applications or services running on a host.
What are the advantages of wireless networks?
Easy mobility, reduced cabling costs, and flexibility in device placement.
What is the purpose of the NTP protocol?
To synchronize time between network devices.
What is the primary purpose of the initial device configuration process on Cisco IOS devices?
To establish network connectivity and basic settings for the device.
What are the three violation modes in Cisco switches and their corresponding actions?
Protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts.
In Cisco switches, protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts. These violation modes provide different actions to handle unauthorized access attempts on switch ports.
What is the purpose and function of MAC addresses in computer networking?
They provide a unique identifier for devices on a network.
What is the process of configuring and verifying a standard access control list (ACL) on a router?
Configure the ACL by defining permit or deny statements based on IP addresses and verify its effectiveness through monitoring network traffic.
Cisco IOS analyzes the device’s logging and debugging output for any indications of errors or abnormal behavior.
False
What is the purpose of a standard Access Control List (ACL) and what are its limitations?
The purpose of a standard ACL is to control access to specific network services and resources based on the source IP address. Its limitations include the inability to filter traffic based on destination IP addresses and port numbers.
Which of the associated codes is used for directly connected devices in a routing table?
C
The associated code “C” is used in a routing table to indicate directly connected networks.
The IPs 192.168.2.3/24 and 192.61.123.1/24 are in the same subnet.
False
Extended access control lists (ACLs) filter packets based on which attributes?
Source and destination IP addresses
Source and destination Layer 4 protocols (UDP and TCP)
Protocol type or number, e.g., IP, HTTPS, 80, etc.
What is one advantage of the TCP/IP model over the OSI model?
Provides a standardized reference model for network communication, allows for interoperability among different vendors’ networking equipment and protocols.
In Cisco ACLs (Access Control Lists), the order in which access control entries (ACEs) are applied matters, with ACEs evaluated from top to bottom, and the first matching ACE determining the action for the traffic.
True
The OSI model has 7 layers, while the TCP/IP model has 4 layers. The OSI model provides a standard reference model for network communication, while the TCP/IP model is a protocol suite used for internet communication.
True